期刊文献+

计算机病毒的演化与控制 被引量:5

Evolution and control of computer virus
下载PDF
导出
摘要 为了更有效地预防和控制计算机病毒,提出了一个传播模型,并利用该模型分析病毒的演化。运用动力学方法分析了模型的平衡态和稳定性,并进行了仿真验证。在理论分析的基础上,利用蒙特卡罗算法仿真了病毒对传播率的演化选择。仿真结果表明,复杂的生态环境更有利于小传播率病毒的传播。对具有演化优势的病毒,进一步仿真了防病毒技术出现的时间延迟和系统重装周期对该类病毒的影响,结果表明,减少时间延迟和有选择地延长系统重装周期有助于遏制小传播率病毒的传播,并且,理论分析为选择系统重装周期提供了指导。 To contain the propagation of computer virus more effectively, a spreading model is presented, which can be used to analyze theevolutionofcomputervirus. Firstly, the model's equilibria and their stability conditions are obtained mathematically and then verified by simulations. Based on the analysis, Monte Carlo algorithm is used to simulate the evolutionary selection of virus on the spreading rate. Simulation results show that the complex ecological environment favors those viruses with low spreading rate. Then, the impacts of the arising time delay of anti-virus technology and the re-installation period of operation system on computer virus with low spreading rate are simulated. It is shown by the simulation results that the effective ways to contain the propagation of computer virus with low spreading rate are decreasing the time delay and prolonging the re-installation period. Furthermore, the selecfion of re-installation period can be guided by our analytical result.
作者 宋礼鹏 韩燮
出处 《计算机工程与设计》 CSCD 北大核心 2011年第7期2252-2255,共4页 Computer Engineering and Design
基金 国家自然科学基金项目(60771026) 新世纪优秀人才计划基金项目(NCE050271) 山西省基础研究基金项目(2010011007) 山西省国际科技合作基金项目(2010081005)
关键词 网络安全 计算机病毒 演化 平衡态与稳定性 动力系统 network security computer virus evolution equilibrium and stability dynamical system
  • 相关文献

参考文献3

二级参考文献24

  • 1杨峰,段海新,李星.网络蠕虫扩散中蠕虫和良性蠕虫交互过程建模与分析[J].中国科学(E辑),2004,34(8):841-856. 被引量:27
  • 2王佰玲,方滨兴,云晓春,张宏莉,陈博,刘乙璇.基于平衡树的良性蠕虫扩散策略[J].计算机研究与发展,2006,43(9):1593-1602. 被引量:8
  • 3FORD R, EUGENE H S. Happy birthday, dear viruses[J]. Science, 2007, 317: 210-211.
  • 4[ BALTHROP J, FORREST S, NEWMAN M E J, et al. Technological networks and the spread of computer viruses[J]. Science, 2004, 304: 527-529.
  • 5NACHENBERG C. Computer virus-antivirus eoevolution[J]. Communications of the ACM, 1997, 40(1 ): 46-51.
  • 6COHEN E Computational aspects of computer viruses[J]. Computers & Security, 1989, 8: 325-344.
  • 7EUGENE H S. Computer viruses-a form of artificial life?[R]. Indiana, USA: Purdue University, 1990.
  • 8COHEN F. Computer viruses: theory and experiments[J]. Computers & Security, 1987, 6: 22-35.
  • 9MARK A L. Computer viruses, artificial life and evolution[M]. Tucson, Arizona: American Eagle Publicationslnc, 1993.
  • 10郝宁湘.计算机病毒:一种可能的生命形式[EB/OL].[2008-02-25].http://cyborg.bokee.com/2586799.html.

共引文献35

同被引文献19

  • 1KHOUZANI M H, SEN S, SHROFF N B. An economic analysis of regulating security investments in the Internet[ C]// Proceedings of IEEE INFOCOM 2013. Piscataway: IEEE Press, 2013:818 -826.
  • 2aRELURA T C. Game theory of social distancing in response to an epidemic[J]. PLoS Computational Biology, 2010, 6( 5) : e1000793.
  • 3KHOUZANI M H, SEN S, SHROFF N B, Managing the adoption of asymmetric bidirectional firewalls: seeding and mandating [ C]// Proceedings of the 2012 IEEE Global Communications Conference. Piscataway: IEEE Press, 2012:911 - 916.
  • 4KHOUZANI M H R, ALTMAN E, SARKAR S. Optimal quaranti- ning of wireless malware through power control[ C]// Proceedings of the 2009 IEEE Information Theory and Applications Workshop. Piscataway: IEEE Press, 2009:301 - 310.
  • 5FENICHEL E P, CASTILLO-CHAVEZ C, CEDDIA M G, et al. Adaptive human behavior in epidemiologieal models[ J]. Proceed- ings of the National Academy of Sciences, 2011, 108(15) : 6306 - 6311.
  • 6KHOUZANI M H R , SARKAR S, ALTMAN E . Dispatch then stop: optimal dissemination of security patches in mobile wireless networks[ C] // Proceedings of the 49th IEEE Conference on Deci- sion and Control. Piscataway: IEEE Press, 2010:2354 -2359.
  • 7陈阵.高校实验室计算机病毒的防治[J].商丘职业技术学院学报,2008,7(5):50-52. 被引量:3
  • 8张迎春.基于特征码技术的攻防策略[J].计算机系统应用,2009,18(3):114-117. 被引量:4
  • 9陈婧婧,李焕洲,唐彰国,钟明全.木马运行机制及行为特征分析[J].计算机安全,2009(10):108-110. 被引量:8
  • 10胡卫,张昌宏,马明田.基于动态行为监测的木马检测系统设计[J].火力与指挥控制,2010,35(2):128-132. 被引量:8

引证文献5

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部